Results 41 to 50 of about 2,362 (202)
Multi-Trace: Multi-level Data Trace Generation with the Cooja Simulator
Wireless low-power, multi-hop networks are exposed to numerous attacks also due to their resource-constraints. While there has been a lot of work on intrusion detection systems for such networks, most of these studies have considered only a few topologies, scenarios and attacks.
Finne, Niclas +6 more
openaire +3 more sources
Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks [PDF]
Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN.
Joseph Kipongo +2 more
doaj +1 more source
A handheld diagnostic system for 6LoWPAN networks [PDF]
The successful deployment of low-power wireless sensor networks (WSNs) in real application environments is a much broader exercise than just the simple instrumentation of the intended monitoring site. Many problems, from node malfunctions to connectivity
core +2 more sources
An Integrated Simulation Module for Cyber-Physical Automation Systems
The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems.
Francesco Ferracuti +3 more
doaj +1 more source
RIOT OS Paves the Way for Implementation of High-Performance MAC Protocols [PDF]
Implementing new, high-performance MAC protocols requires real-time features, to be able to synchronize correctly between different unrelated devices. Such features are highly desirable for operating wireless sensor networks (WSN) that are designed to be
Roussel, Kévin +2 more
core +4 more sources
Improved RAL routing protocol to identify duplicate packets in QoS
The area of study of motion control to Wireless Sensor Networks (WSN) was difficult. This study examines the problem of vehicular networks in the previously implemented IETF pathing algorithm standard to reduce power electricity WSN, the Routing ...
T.S. Sasikala +5 more
doaj +1 more source
Sensor node location information is critical in many Wireless Sensor Network (WSN) applications with random sensor node deployment. In such applications, node localization using a faster area exploration mechanism is needed to initiate precise sensing ...
Shamanth Nagaraju +4 more
doaj +1 more source
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent +6 more
core +4 more sources
Enhancing IoT Performance via Using Mobility Aware for Dynamic RPL Routing Protocol Technique (MA-RPL) [PDF]
Nodes' aware-mobility in the Internet of Things (IoTs) stills open defy for researchers, due to the dynamic changing of routing path and networks’ resource limitations.
Ahmed R. Zarzoor
doaj +1 more source
Evolving SDN for Low-Power IoT Networks [PDF]
Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform.
Baddeley, Michael +4 more
core +3 more sources

